From 6d2d865830e964f436a83bcae5799eab22ea0556 Mon Sep 17 00:00:00 2001 From: Jens Steube Date: Wed, 5 Jan 2022 11:05:41 +0100 Subject: [PATCH] Fixed handling of password candidates that are shorter than the minimum password length in Association Attack --- docs/changes.txt | 5 +++-- src/dispatch.c | 1 + 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/docs/changes.txt b/docs/changes.txt index 46c924592..813a82f2a 100644 --- a/docs/changes.txt +++ b/docs/changes.txt @@ -20,10 +20,11 @@ ## - Fixed functional error when nonce-error-corrections that were set on the command line in hash-mode 22000/22001 were not accepted -- Fixed method how OPTS_TYPE_AUX* kernels are called in association mode, for instance WPA/WPA2 kernels +- Fixed handling of password candidates that are shorter than the minimum password length in Association Attack +- Fixed method of how OPTS_TYPE_AUX* kernels are called in an association attack, for example in WPA/WPA2 kernel - Fixed missing option flag OPTS_TYPE_SUGGEST_KG for hash-mode 11600 to inform the user about possible false positives in this mode - Fixed undefined function call to hc_byte_perm_S() in hash-mode 17010 on non-CUDA compute devices -- Fixed HEX wordlist handling in -m 3000 +- Fixed wordlist handling in -m 3000 when candidate passwords use the $HEX[...] syntax ## ## Technical diff --git a/src/dispatch.c b/src/dispatch.c index 3f60ecc21..2078cfdac 100644 --- a/src/dispatch.c +++ b/src/dispatch.c @@ -1437,6 +1437,7 @@ static int calc (hashcat_ctx_t *hashcat_ctx, hc_device_param_t *device_param) // we can't reject password base on length in -a 9 because it will bring the schedule out of sync // therefore we render it defective so the other candidates survive + line_len = MAX (line_len, hashconfig->pw_min); line_len = MIN (line_len, hashconfig->pw_max); }